ORCID Profile
0000-0002-9229-5787
Current Organisation
Deakin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2020
Publisher: Springer Science and Business Media LLC
Date: 23-01-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Springer Science and Business Media LLC
Date: 06-04-2013
Publisher: Elsevier BV
Date: 06-2018
Publisher: Springer Science and Business Media LLC
Date: 27-05-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2019
Publisher: Elsevier BV
Date: 09-2019
Publisher: Elsevier BV
Date: 02-2014
Publisher: Elsevier BV
Date: 03-2017
Publisher: Hindawi Limited
Date: 02-01-2019
DOI: 10.1155/2019/6046353
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2021
Publisher: Elsevier BV
Date: 02-2020
Publisher: Hindawi Limited
Date: 10-06-2019
DOI: 10.1155/2019/2315627
Abstract: To restrain escalating computer viruses, new virus patches must be constantly injected into networks. In this scenario, the patch-developing cost should be balanced against the negative impact of virus. This article focuses on seeking best-balanced patch-injecting strategies. First, based on a novel virus-patch interactive model, the original problem is reduced to an optimal control problem, in which (a) each admissible control stands for a feasible patch-injecting strategy and (b) the objective functional measures the balance of a feasible patch-injecting strategy. Second, the solvability of the optimal control problem is proved, and the optimality system for solving the problem is derived. Next, a few best-balanced patch-injecting strategies are presented by solving the corresponding optimality systems. Finally, the effects of some factors on the best balance of a patch-injecting strategy are examined. Our results will be helpful in defending against virus attacks in a cost-effective way.
Publisher: MDPI AG
Date: 10-01-2019
DOI: 10.3390/S19020262
Abstract: Wireless sensor networks (WSNs) are vulnerable to computer viruses. To protect WSNs from virus attack, the virus library associated with each sensor node must be updated in a timely way. This article is devoted to developing energy-efficient patching strategies for WSNs. First, we model the original problem as an optimal control problem in which (a) each control stands for a patching strategy, and (b) the objective functional to be optimized stands for the energy efficiency of a patching strategy. Second, we prove that the optimal control problem is solvable. Next, we derive the optimality system for solving the optimal control problem, accompanied with a few ex les. Finally, we examine the effects of some factors on the optimal control. The obtained results help improve the security of WSNs.
Publisher: Elsevier BV
Date: 05-2016
Publisher: Elsevier BV
Date: 02-2012
Publisher: Hindawi Limited
Date: 2010
DOI: 10.1155/2010/367492
Abstract: We mainly investigate the global asymptotic stability and exponential convergence of positive solutions to two families of higher-order difference equations, one of which was recently studied in Stević's paper (2010). A new concise proof is given to a quite recent result by Stević and analogous parallel result of the other inverse equation, which extend related results of Aloqeili (2009), Berenhaut and Stević (2007), and Liao et al. (2009).
Publisher: Public Library of Science (PLoS)
Date: 12-05-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Elsevier BV
Date: 07-2019
Publisher: Elsevier BV
Date: 07-2019
Publisher: Elsevier BV
Date: 12-2013
Publisher: Elsevier BV
Date: 11-2018
Publisher: Elsevier BV
Date: 06-2014
Publisher: Elsevier BV
Date: 07-2019
Publisher: Hindawi Limited
Date: 2017
DOI: 10.1155/2017/9873678
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2019
Publisher: Public Library of Science (PLoS)
Date: 12-08-2016
Publisher: Elsevier BV
Date: 08-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2020
Publisher: Hindawi Limited
Date: 30-09-2020
DOI: 10.1155/2020/6263748
Abstract: Rumors have been widely spread in online social networks and they become a major concern in modern society. This paper is devoted to the design of a cost-effective rumor-containing scheme in online social networks through an optimal control approach. First, a new in idual-based rumor spreading model is proposed, and the model considers the influence of the external environment on rumor spreading for the first time. Second, the cost-effectiveness is recommended to balance the loss caused by rumors against the cost of a rumor-containing scheme. On this basis, we reduce the original problem to an optimal control model. Next, we prove that this model is solvable, and we present the optimality system for the model. Finally, we show that the resulting rumor-containing scheme is cost-effective through extensive computer experiments.
Publisher: Informa UK Limited
Date: 07-09-2016
Publisher: Public Library of Science (PLoS)
Date: 28-12-2018
Publisher: Elsevier BV
Date: 03-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2019
Publisher: Elsevier BV
Date: 03-2017
Publisher: Elsevier BV
Date: 04-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2021
Publisher: Springer Science and Business Media LLC
Date: 11-12-2017
Publisher: MDPI AG
Date: 26-06-2023
DOI: 10.3390/S23135943
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
Publisher: Elsevier BV
Date: 03-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Hindawi Limited
Date: 2018
DOI: 10.1155/2018/2975376
Abstract: The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT c aign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some ex les of the optimal control are given. Finally, the influence of some factors on the effectiveness of an optimal control is examined through computer experiments. These findings help organizations to work out policies of defending against APTs.
Publisher: Public Library of Science (PLoS)
Date: 29-07-2015
Publisher: Hindawi Limited
Date: 21-01-2020
DOI: 10.1155/2020/9408942
Abstract: To cope with evolving computer viruses, antivirus programs must be periodically updated. Due to the limited network bandwidth, new virus patches are typically injected into a small subset of network nodes and then forwarded to the remaining nodes. A static patching strategy consists of a fixed patch injection rate and a fixed patch forwarding rate. This paper focuses on evaluating the performance of a static patching strategy. First, we introduce a novel autonomous node-level virus-patch propagation model to characterize the effect of a static patching strategy. Second, we show that the model is globally attracting, implying that regardless of the initial expected state of the network, the expected fraction of the infected nodes converges to the same value. Therefore, we use the asymptotic expected fraction of the infected nodes as the measure of performance of a static patching strategy. On this basis, we evaluate the performances of a few static patching strategies. Finally, we examine the influences of a few parameters on the performance of a static patching strategy. Our findings provide a significant guidance for restraining malware propagation.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2021
Publisher: Public Library of Science (PLoS)
Date: 14-09-2015
Publisher: Elsevier BV
Date: 2012
Publisher: Hindawi Limited
Date: 2011
DOI: 10.1155/2011/828509
Abstract: By incorporating the chemotherapy into a previous model describing the interaction of the immune system with the human immunodeficiency virus (HIV), this paper proposes a novel HIV virus spread model with control variables. Our goal is to maximize the number of healthy cells and, meanwhile, to minimize the cost of chemotherapy. In this context, the existence of an optimal control is proved. Experimental results show that, under this model, the spread of HIV virus can be controlled effectively.
Publisher: Public Library of Science (PLoS)
Date: 25-01-2018
Publisher: Elsevier BV
Date: 02-2013
Publisher: Elsevier BV
Date: 02-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Wiley
Date: 30-06-2017
DOI: 10.1002/MMA.4061
Publisher: Informa UK Limited
Date: 11-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Elsevier BV
Date: 09-2017
Publisher: Elsevier BV
Date: 12-2012
Publisher: Hindawi Limited
Date: 2012
DOI: 10.1155/2012/693695
Abstract: All the known models describing the propagation of virus codes were based on the assumption that a computer is uninfected at the time it is being connected to the Internet. In reality, however, it is much likely that infected computers are connected to the Internet. This paper is intended to investigate the propagation behavior of virus programs provided infected computers are connected to the Internet with positive probability. For that purpose, a new model characterizing the spread of computer virus is proposed. Theoretical analysis of this model indicates that (1) there is a unique (viral) equilibrium, and (2) this equilibrium is globally asymptotically stable. Further study shows that, by taking active measures, the percentage of infected computers can be made below an acceptable threshold value.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institution of Engineering and Technology (IET)
Date: 02-03-2023
DOI: 10.1049/BLC2.12027
Publisher: Elsevier BV
Date: 12-2013
Publisher: Hindawi Limited
Date: 2012
DOI: 10.1155/2012/259671
Abstract: Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that computer viruses spread on networks. This paper is intended to establish a series of rational epidemic models of computer viruses. First, a close inspection of some common characteristics shared by all typical computer viruses clearly reveals the flaws of previous models. Then, a generic epidemic model of viruses, which is named as the SLBS model, is proposed. Finally, erse generalizations of the SLBS model are suggested. We believe this work opens a door to the full understanding of how computer viruses prevail on the Internet.
No related grants have been discovered for Lu-Xing Yang.